Academic literature on the topic 'Computer ethics'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer ethics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer ethics"

1

Stamatellos, Giannis. "Computer Ethics and Neoplatonic Virtue." International Journal of Cyber Ethics in Education 1, no. 1 (January 2011): 1–11. http://dx.doi.org/10.4018/ijcee.2011010101.

Full text
Abstract:
In normative ethical theory, computer ethics belongs to the area of applied ethics dealing with practical and everyday moral problems arising from the use of computers and computer networks in the information society. Modern scholarship usually approves deontological and utilitarian ethics as appropriate to computer ethics, while classical theories of ethics, such as virtue ethics, are usually neglected as anachronistic and unsuitable to the information era and ICT industry. During past decades, an Aristotelian form of virtue ethics has been revived in modern philosophical enquiries with serious attempts for application to computer ethics and cyberethics. In this paper, the author argues that current trends and behaviours in online communication require an ethics of self-care found in Plotinus’ self-centred virtue ethics theory. The paper supports the position that Plotinus’ virtue ethics of intellectual autonomy and self-determination is relevant to cyberethics discussions involved in computer education and online communication.
APA, Harvard, Vancouver, ISO, and other styles
2

Bhattarakosol, Pattarasinee. "A Perspective in Computer Ethics." MANUSYA 7, no. 4 (2004): 62–67. http://dx.doi.org/10.1163/26659077-00704005.

Full text
Abstract:
Since computers are counted as a part of life, the issue of computer-related ethics has been considered seriously. Although there have been many studies done and various guidelines had been announced over the decades, enforcement has been impossible. This paper presents a short description of computer ethics and discusses the impacts when ethics are infringed. The causes of breaking ethical guidelines have been raised. Solutions are proposed to solve these causes by obtaining the cooperation of the family and using doctrines.
APA, Harvard, Vancouver, ISO, and other styles
3

Henry, John W., and Margaret Anne Pierce. "Computer ethics." ACM SIGCPR Computer Personnel 15, no. 3 (October 1994): 21–27. http://dx.doi.org/10.1145/190779.190782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Johnson, Deborah G., James H. Moor, and Herman T. Tavani. "Computer ethics." ACM SIGCAS Computers and Society 30, no. 4 (December 2000): 6–9. http://dx.doi.org/10.1145/572260.572263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bynum, Terrell Ward. "Computer Ethics." Teaching Philosophy 14, no. 1 (1991): 95–98. http://dx.doi.org/10.5840/teachphil199114115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Behar, Joseph E. "Computer Ethics." Computers in Human Services 9, no. 3-4 (May 7, 1993): 441–53. http://dx.doi.org/10.1300/j407v09n03_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tavani, Herman T., and Lucas D. Introna. "Computer ethics." ACM SIGCAS Computers and Society 29, no. 1 (March 1999): 4–8. http://dx.doi.org/10.1145/382042.382044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

O’Connell, Brian M., and Joseph R. Herkert. "Engineering Ethics and Computer Ethics." Techné: Research in Philosophy and Technology 8, no. 1 (2004): 36–56. http://dx.doi.org/10.5840/techne2004819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Isneniwati, Carlia. "In Search of Code Ethics Principles for IT Professionals in Indonesia." ACMIT Proceedings 1, no. 1 (March 18, 2014): 98–111. http://dx.doi.org/10.33555/acmit.v1i1.20.

Full text
Abstract:
A type of standard problem in computer ethics occurs because there is no policy about how computer technology should be used. Computers are provided to us with new capabilities and giving us a choice of use. Frequently, not only a policy that gives direction in this situation, the existence of a policy has the same function. A primary goal of the Computer Ethics is to explain what we should do in these circumstances, for example, to formulate a policy that aims to direct our activities. Of course some ethical situations are suitable for individuals and some for community. Computer ethics includes consideration of both individual and community to user ethics of computer technology. Computer ethics include (1) identification of the cause of the gap in policy; (2) clarification of the concept which is chaotic; (3) formulate policies for users of computer technology; and (4) ethics justification such as policy.
APA, Harvard, Vancouver, ISO, and other styles
10

Ferreira, Rodrigo, and Moshe Y. Vardi. "Computer Ethics and Care." Teaching Ethics 20, no. 1 (2020): 139–56. http://dx.doi.org/10.5840/tej202133187.

Full text
Abstract:
Following increasing public concern over the ethical and social implications of contemporary technology, computer science departments around the world have recently increased their efforts to incorporate ethics into their educational curriculum. For our redesigned undergraduate course on Computer Ethics at Rice University, in addition to teaching variety of fundamental ethical theories and approaches to technology, we also sought to emphasize the role of “social” technologies in mediating moral relations and to encourage students to consider moral decision-making, rather than as an abstract rational process, as matter of affective care. To help us achieve this educational objective and inspired by the work of artist Jenny Odell, we designed an activity for students to practice focusing “deep” attention both on themselves and others. In this article, we describe in detail our rationale for this activity, report on lessons learned, and discuss potential applications for this activity in regard to the ongoing online teaching environment following the Covid-19 pandemic.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer ethics"

1

Hall, Brian Richard. "A synthesized definition and analysis of computer ethics." Thesis, Robert Morris University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3622702.

Full text
Abstract:

Computing ethics is a complex area of study that is of significant importance to the computing community and global society. Such concerns as surveillance and automation underscore the need for increased ethical understanding and training in computing. However, education and research in computing ethics are difficult due to the diverse meanings of ethics. This content analysis study analyzed definitions of computer ethics, the subject matter of computer ethics, and the relationship between the definition and subject matter. The purpose of this study was to educe and present the meaning of computing ethics, resulting in a thematic definition of computing ethics for use in education and research. This analysis also provides a coherent concept of the subject matter of computing ethics in relation to the synthesized definition. This study discusses definition and subject matter themes that emerged such as interdisciplinarity, collaboration, scholars and professionals, contributions and costs, computing artifacts, global society, privacy, design and development, and use. The results of this study can assist computing ethicists with research, aid computing educators with curriculum development, and provide a theoretical frame for relating ethics to computing. This exploration demonstrates that groups within the computing community can find common ground, even on such a difficult and complex matter as ethics.

APA, Harvard, Vancouver, ISO, and other styles
2

So, Siu-fan Sylvia, and 蘇少芬. "Computer ethics: youth attitude and behavior in digital piracy." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29960551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Turilli, Matteo. "Ethics and the practice of software design." Thesis, University of Oxford, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.711646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ghazali, Hamed. "Examining high-school students' views on computer and information ethics /." Search for this dissertation online, 2003. http://wwwlib.umi.com/cr/ksu/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Assefa, B. (Bethelhem). "Motivations behind software piracy:from the viewpoint of computer ethics theories." Master's thesis, University of Oulu, 2014. http://urn.fi/URN:NBN:fi:oulu-201405241494.

Full text
Abstract:
Computer Ethics is a study of ethical issues that are related mainly with computing machines and computing profession. The features of internet that, it is global and interactive, it allows users to stay anonymous, and it enables reproducibility of information possible unlike before makes the online behavior morally different. Computer ethics studies the nature and social influence of computing machines and ethical issues in formulating and justification of policies. Software Piracy, which is the unauthorized use or copying of software illegally, has become a major problem for businesses and it is widespread in many parts of the world which led to drain of economy. As the access to use computer grows, the percentage for using pirated software also grows. The Business Software Alliance (BSA) and the Software Publishers Association (SPA) made estimation (2010) that there are two-ten illegal copies of software are available for every legal copy of software sold. Software piracy is one of the most remarkable among computer ethics’ breaches. Unlike other activities like hacking and security breaches, which are outright illegal, software piracy technically covers a gray area of ethical principles, as they relate to computers and information technology. This is because people might inadvertently commit the act without realizing that they are ethically/morally/legally wrong. When one buys software, it means that they actually are buying the software license but not the software. This is similar to artistic copyrights, where a composer/artist holds the license to his work and gains monetary compensation on a licensing basis. However, the ease with which the software can be copied makes it difficult to exercise licensing rights. One of the ways to counter software piracy is to understand the motivations behind it and create awareness. The purpose of this research is to understand the principles of computing ethics in-depth and use this knowledge to understand what drives average people to commit acts of software piracy. The purpose is to use this information to create awareness among general public regarding software piracy.
APA, Harvard, Vancouver, ISO, and other styles
6

Dodig-Crnkovic, Gordana. "Investigations into Information Semantics and Ethics of Computing." Doctoral thesis, Västerås : Mälardalen University, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Almualla, Suad. "Towards a pedagogy for teaching computer ethics in universities in Bahrain." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/8804.

Full text
Abstract:
This study presents a critical investigation into the teaching of computer ethics. A qualitative pluralistic approach (a mixture of qualitative approaches) was used to investigate case studies of teaching computer ethics to university-level students from Bahrain. The main issue was that ethics to Arabs and Muslims is a matter of religion than a matter of philosophy whereas the dominant perception in the academic literature which discussed computer ethics teaching is that computer ethics is a form of practical philosophy and hence separate from religion. In order to shed light on this, the study investigated computer ethic’s perceptions and teaching practices which were occurring in universities in Bahrain. The study found that the issue was not a matter of perception but rather a matter of confusion and a misconception. Computer ethics was being confused with morality, religion, basic computer skills to name just a few. And such confusion was causing computer ethics to gradually disappear from the curriculum and become substituted with concepts which were not necessarily capable of building students’ ethical thinking. The study recommends that computer ethics teachers and policy makers from Bahrain distinguish computer ethics from religion, morality and from any other concept and identify it as an independent field of study, also teachers need to involve their students in social and ethical analysis of various kinds so that students understand that ethics is not a set of rules on what is forbidden and allowed aimed at providing straightforward answers to a given problem but rather ethics is a ‘cognitive tool’; a mechanism through which different competing ethical theories and standards are used to reflect on a given problem.
APA, Harvard, Vancouver, ISO, and other styles
8

Ekhäll, Susanne. "Ethical awareness in some Swedish IT-companies." Thesis, University of Skövde, School of Humanities and Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-985.

Full text
Abstract:

Ethical considerations have become more important in our environment, since all humans are moral agents and we can not avoid the involvement of ethical issues in every activity that we take part in. Ethical issues are vital, and it seems that it has become a burning question. This study presents the results of a survey of how Chief Executive Officers (CEO) in five IT-companies considers and work with attitudes toward ethical issues. The survey indicated that ethics in IT-companies has much to do with relations, relations between employees, relations between company and customer, and the importance of creating long-term relationships with customers. The survey also indicated the individual view of ethics. Finally, suggestions for further examination in this area are made.

APA, Harvard, Vancouver, ISO, and other styles
9

Gray, John Max. "Virtue Ethics: Examining Influences on the Ethical Commitment of Information System Workers in Trusted Positions." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/364.

Full text
Abstract:
Despite an abundance of research on the problem of insider threats, only limited success has been achieved in preventing trusted insiders from committing security violations. Virtue ethics may be an approach that can be utilized to address this issue. Human factors such as moral considerations impact Information System (IS) design, use, and security; consequently they affect the security posture and culture of an organization. Virtue ethics based concepts have the potential to influence and align the moral values and behavior of information systems workers with those of an organization in order to provide increased protection of IS assets. An individual’s character strengths have been linked to positive personal development, but there has been very little research into how the positive characteristics of virtue ethics, exhibited through the character development of information systems workers, can contribute to improving system security. This research aimed to address this gap by examining factors that affect and shape the ethical perspectives of individuals entrusted with privileged access to information. This study builds upon prior research and theoretical frameworks on institutionalizing ethics into organizations and Information Ethics to propose a new theoretical model which demonstrates the influences on Information Systems Security (ISS) trusted worker ethical behavior within an organization. Components of the research model include ISS virtue ethics based constructs, organizational based internal influences, societal based external influences, and trusted worker ethical behavior. This study used data collected from 395 professionals in an ISS organization to empirically assess the model. Partial Least Squares Structural Equation Modeling was employed to analyze the indicators, constructs, and path relationships. Various statistical tests determined validity and reliability, with mixed but adequate results. All of the relationships between constructs were positive, although some were stronger and more significant. The expectation of the researcher in this study was to better understand the character of individuals who pose an insider threat by validating the proposed model, thereby providing a conceptual analysis of the character traits which influence the ethical behavior of trusted workers and ultimately information system security.
APA, Harvard, Vancouver, ISO, and other styles
10

Senter, Jasper W. Thornton Cayetano S. "Information technology (IT) ethics : training and awareness materials for the Department of the Navy /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FThornton%5FSenter.pdf.

Full text
Abstract:
Thesis (M.S.)--Naval Postgraduate School, 2002.
Thesis advisor(s): Cynthia E. Irvine, Floyd Brock. Jasper W. Senter graduated in September, 2002; Cayetano S. Thornton graduated in June, 2002. Includes bibliographical references (p. 59-61). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer ethics"

1

Johnson, Deborah G. Computer ethics. 2nd ed. Englewood Cliffs, N.J: Prentice Hall, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Computer ethics. New York, NY: Facts On File, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Johnson, Deborah G. Computer ethics. Englewood Cliffs, N.J: Prentice-Hall, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Johnson, Deborah G. Computer ethics. 3rd ed. Upper Saddle River, NJ: Prentice Hall, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Business computer ethics. Reading, Mass: Addison Wesley, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Practical computer ethics. London: McGraw-Hill, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Douglas, Adeney, ed. Computer and information ethics. Westport, Conn: Greenwood Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Computer and information ethics. 2nd ed. Champaign, Ill: Stipes Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Moor, James H. What is computer ethics. [S.L.]: [S.N.], 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1952-, Miller Keith, ed. Computer ethics: Analyzing information technology. 4th ed. Upper Saddle River, N.J: Pearson Prentice Hall, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer ethics"

1

Johnson, Deborah G. "Computer Ethics." In The Blackwell Guide to the Philosophy of Computing and Information, 63–75. Oxford, UK: Blackwell Publishing Ltd, 2008. http://dx.doi.org/10.1002/9780470757017.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kizza, Joseph Migga. "Computer Crimes." In Ethics in Computing, 177–94. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29106-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kizza, Joseph Migga. "Ethics and Ethical Analysis." In Texts in Computer Science, 31–54. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70712-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kizza, Joseph Migga. "Ethics and Ethical Analysis." In Texts in Computer Science, 29–51. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4990-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kizza, Joseph Migga. "Ethics and Ethical Analysis." In Texts in Computer Science, 31–54. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-038-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zobel, Justin. "Ethics." In Writing for Computer Science, 255–64. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-6639-9_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zobel, Justin. "Ethics." In Writing for Computer Science, 215–24. London: Springer London, 2004. http://dx.doi.org/10.1007/978-0-85729-422-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kizza, Joseph Migga. "Ethics and Ethical Analysis." In Undergraduate Topics in Computer Science, 17–33. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03937-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Durán, Juan Manuel. "Ethics and Computer Simulations." In The Frontiers Collection, 171–88. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-90882-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

das Neves, João César. "Business Ethics as Personal Ethics." In Communications in Computer and Information Science, 3–12. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-52758-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer ethics"

1

Fisher, Theresia G., and Adel M. Abunawass. "Computer ethics." In the conference. New York, New York, USA: ACM Press, 1994. http://dx.doi.org/10.1145/199544.199590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Byrne, Graeme, and Lorraine Staehr. "The Evaluation of a Computer Ethics Program." In InSITE 2004: Informing Science + IT Education Conference. Informing Science Institute, 2004. http://dx.doi.org/10.28945/2761.

Full text
Abstract:
The importance of teaching computer ethics is shown by its inclusion as core content in both information systems and computer science model curricula. This paper outlines a method for evaluating undergraduate computer ethics programs using the Defining Issues Test of moral judgment. A “before-and-after with a control group” research design was used. The experimental group exhibited a significantly larger increase in moral judgment development than the control group. This indicates that computer ethics teaching is having a useful effect on students’ ethical development.
APA, Harvard, Vancouver, ISO, and other styles
3

Shoup, Terry E., and Thomas Shanks. "The Ethics Toolkit: A Computer Program for Teaching Ethics to Engineering Students." In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4441.

Full text
Abstract:
Abstract This paper describes a new computer application known as the Ethics Toolkit that is useful in enabling engineering students to learn about ethical problem solving. The application runs in a Windows environment and implements five different approaches to ethical problem solving found in the literature. Although the application does not provide absolute answers to ethical problems, it does facilitate the automation, organization and prioritization of solution possibilities.
APA, Harvard, Vancouver, ISO, and other styles
4

Allison, Ian K., and Peter Halstead. "Teaching computer ethics." In the first Australasian conference. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/369585.369661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

White, Gregory B., and Udo W. Pooch. "Computer ethics education." In the conference. New York, New York, USA: ACM Press, 1994. http://dx.doi.org/10.1145/199544.199610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Reich, Rob, Mehran Sahami, Jeremy M. Weinstein, and Hilary Cohen. "Teaching Computer Ethics." In SIGCSE '20: The 51st ACM Technical Symposium on Computer Science Education. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3328778.3366951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Campbell, Marlene. "Ethics and computer security." In the 1988 ACM sixteenth annual conference. New York, New York, USA: ACM Press, 1988. http://dx.doi.org/10.1145/322609.322781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Streib, James T. "Seminar in computer ethics." In the symposium. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/238339.238350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

King, Ronald S., and James H. Nolen. "A computer ethics course." In the sixteenth SIGCSE technical symposium. New York, New York, USA: ACM Press, 1985. http://dx.doi.org/10.1145/323287.323297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barnard, Andries, Corne de Ridder, Laurette Pretorius, and Eli Cohen. "Integrating Computer Ethics into the Computing Curriculum: A Framework for Implementation." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2619.

Full text
Abstract:
The advent of the Information Age and global connectivity has placed ethics center stage in the use of Information and Communication Technologies (ICT). As the drive towards the establishment of a so-called IT profession gains momentum, ethical conduct and codes of ethics have recently been formulated and introduced formally. Initiatives in this regard can be attributed to, among others, the ACM and the IEEE. Of particular significance is the ImpactCS Project commissioned by the joint taskforce of the ACM and IEEE, and funded by the USA’s National Science Foundation. The increased globalization and inherent nature of ICT transcend physical and cultural borders, making it increasingly difficult to enforce accepted laws, regulations, and codes of conduct. It is thus the responsibility of Computer Science and Information Systems instructors to teach and instill professional values and ethical analysis skills in each and every student. Therefore, we investigate some issues pertaining to the teaching of computer ethics. We conclude this paper by presenting a possible framework to be used in the teaching of computer ethics, and apply this framework to our own institution.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer ethics"

1

Bayles, William J. Moral and Ethical Considerations for Computer Network Attack As a Means of National Power in Time of War. Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada376725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

David, Uttal, Katherine James, Steven McGee, and Phillip Boda. Laying the Foundation for a Spatial Reasoning Researcher-Practitioner Partnership with CPS, SILC, and The Learning Partnership. Northwestern University, September 2021. http://dx.doi.org/10.51420/report.2020.1.

Full text
Abstract:
The goal of this project was to explore how explicit instruction in spatial reasoning in primary grades can contribute to reductions in variation in STEM outcomes for low-income, minority students in the Chicago Public Schools (CPS). Our project focused on the persistent gender, racial and ethnic, and socioeconomic inequalities in STEM educational and career achievement and attainment. Our approach to addressing this problem was guided by research evidence that much of the variation in STEM outcomes for these groups can be explained by spatial reasoning abilities. Importantly, spatial reasoning skills can be improved through practice, but are rarely explicitly taught in the classroom. The spatial reasoning needs and opportunities identified by this work are relevant to CPS in that they focus on the prevalent science, math, and computer science curricula currently used in CPS K-2 instruction. As such, our findings provide specific, actionable guidance for the development of curricular supports that infuse explicit spatial reasoning instruction.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography